Who's Tracking Your Smartphone?


 Safety should always be our top priority. With the help of just a few short codes, you can find out more about the settings of your phone and work out whether or not your messages and information are protected and whether you’re being tracked.

We has gathered together some of the most useful and important codes for smartphones all in one article, together with some instructions for those who’re worried about being tracked.

With this code, you can find out whether your calls, messages, and other data are being diverted. The status of the different types of diversions that are taking place along with the number the information is being transferred to will be displayed on your phone’s screen. This function is most often set up by either jealous partners or parents who are trying to protect their kids from spam or criminals. Elderly people often become victims of this practice when they lend their phone to a stranger to make a single call. If they do so, they risk having information about where they live, who their friends and family are, their habits and daily activities, and even their financial circumstances passed on to criminals.
Dial this code if you want to find out where calls, messages, and data are being redirected to if it seems that no one can get through to you. The chances are in this case that your voice calls are being redirected to one of your cell phone operator’s numbers.
This is a universal code for switching off all forms of redirection away from your phone. It’s a good idea to use this before you have to use roaming. In this case, money won’t be taken from your account for calls that are redirected by default to your voice mail.
With the help of this code, you can find out your IMEI (International Mobile Equipment Identifier). If you know this number, you can find your phone if someone steals it. When switched on, its location is automatically conveyed to the network operator even if a different SIM card is inserted. If someone knows your IMEI number, they can find out the model and technical characteristics of your phone.
Special codes exist that allow someone to track your location and also to determine whether someone is following you. For this, you need the utility net-monitor. Type in one of the following codes:

for iPhone: *3001#12345#* 
for Android: *#*#4636#*#* or *#*#197328640#*#*

Step 1. Go to the section called UMTS Cell Environment, then UMTS RR info, and write down all the numbers under Cell ID. These numbers are the basic stations located nearby. Your phone will connect by default to the one that emits the best signal.

Step 2. Go back to the main menu, and click on the MM info tab, then on Serving PLMN. Write down the numbers under Local Area Code (LAC).

Step 3. With the help of these two numbers and an ordinary website (the fourth tab to the left), you can determine the location on the map of the basic station that your phone is connected to.

The ones to be suspicious of are mobile basic stations — this could be a truck or small bus with a large antenna. These kinds of vehicles are used at rock festivals and in places where Internet coverage is poor. If there’s one of them nearby, seemingly without any logical reason, it’s just possible that someone is engaged in spying.
If you use Android, you should periodically check your phone for viruses. Place Raiders one of the most dangerous ones that can infect your device. Developed by American experts, it was meant to show how vulnerable our devices are. Once it gets onto a phone, this Trojan takes a series of photographs of the surrounding area, creates a 3D model of the building you’re in, and then takes advantage of any Internet connection to send the data that it’s gathered, adding along with it all the data on the phone and your passwords.
  • National security agencies in virtually all countries now cooperate with cell phone operators, who often provide the former with access to information on any of their customers provided they have a warrant from a court. As a minimum, they provide data from the last three months.

  • If your phone has been tapped by a security agency, the chances are you won’t even notice. If a phone makes odd noises during a conversation, loses battery power rapidly, overheats, or unexpectedly restarts, this is merely an indication that you need to get it repaired rather than a telltale sign that you’re being listened to.

  • People generally don’t reveal all that much in phone conversations, so from the point of view of those who want to listen in it’s much more worthwhile to set up special devices ("bugs") in someone’s home. Radio wave detectors can be used to work out whether such bugs are present in a building.
  • Use messaging apps that are completely closed to outsiders, such as Telegram, Chare, Wickr, or Signal.

  • Determine what information it’s safe to make accessible to all. Should everyone really be able to find out your phone number or have access to information about your family, loved ones, or your lifestyle? Be very careful when posting photographs of children.

  • Don’t install unknown programs on your phone, keep close track of the apps you have installed, and use multiple security locks wherever you can. Don’t click on unsafe links, and don’t connect your phone to suspicious "free" charging points.

  • Only your cell phone operator should ever offer you tracking services, and they should only turn them on with your explicit agreement. Websites and applications that offer to find out the location of other people are almost certainly acting with criminal intent. Be careful!

For More Visit : www.amadahmad.blogspot.com

Our Education System

10 Powerful Life Lessons from The Alchemist



The Alchemist by Paulo Coelho is one of the best-selling books in history. The story of Santiago, the shepherd boy on a journey to realize his “Personal Legend” has inspired people all over the world to live their dreams.
Here are ten of the most popular passages and lessons to apply to your life:
1. Fear is a bigger obstacle than the obstacle itself
“Tell your heart that the fear of suffering is worse than the suffering itself. And that no heart has ever suffered when it goes in search of its dreams, because every second of the search is a second’s encounter with God and with eternity.”
Any new pursuit requires entering uncharted territory — that’s scary. But with any great risk comes great reward. The experiences you gain in pursuing your dream will make it all worthwhile.
2. What is “true” will always endure
“If what one finds is made of pure matter, it will never spoil. And one can always come back. If what you had found was only a moment of light, like the explosion of a star, you would find nothing on your return.”
Truth cannot be veiled by smoke and mirrors — it will always stand firm. When you’re searching for the “right” decision, it will be the one that withstands the tests of time and the weight of scrutiny.
3. Break the monotony
“When each day is the same as the next, it’s because people fail to recognize the good things that happen in their lives every day that the sun rises.”
Gratitude is the practice of finding the good in each day. Life can easily become stagnant, mundane, and monotonous, but that changes depending on what we choose to see. There’s always a silver lining, if you look for it.
4. Embrace the present
“Because I don’t live in either my past or my future. I’m interested only in the present. If you can concentrate always on the present, you’ll be a happy man.”
There’s no point dwelling in the past and letting it define you, nor getting lost and anxious about the future. But in the present moment, you’re in the field of possibility — how you engage with the present moment will direct your life.
5. Your success has a ripple-effect
“That’s what alchemists do. They show that, when we strive to become better than we are, everything around us becomes better, too.”
Growth, change, and evolution are weaved into the fabric of reality. Becoming a better version of yourself creates a ripple effect that benefits everything around you: your lifestyle, your family, your friends, your community.
6. Make the decision
“When someone makes a decision, he is really diving into a strong current that will carry him to places he has never dreamed of when he first made the decision.”
It’s easy to get overwhelmed by the unknowns and finer details of your dreams. Actions will flow out of having confidence in your decision; sitting on the fence will get you nowhere.
7. Be unrealistic
“I see the world in terms of what I would like to see happen, not what actually does.”
Some of the greatest inventions would not have happened if people chose to accept the world as it is. Great achievements and innovations begin with a mindset that ignores the impossible.
8. Keep getting back up
“The secret of life, though, is to fall seven times and to get up eight times.”
Because the eighth time could be your breakthrough. Some of the greatest novels in history were published after receiving hundreds of rejections. Thankfully, those authors never gave up.
9. Focus on your own journey
“If someone isn’t what others want them to be, the others become angry. Everyone seems to have a clear idea of how other people should lead their lives, but none about his or her own.”
It’s easy to be influenced by others, but you’ll be miserable if you end up living someone else’s life. There’s nothing wrong with taking advice and learning from others, but make sure it aligns with your desires and passions.
10. Always take action
“There is only one way to learn. It’s through action.”
You can study, read, and listen until you turn blue in the face, but the full experience is when you take action, and let the rubber meet the road. Once you’re done aiming, pull the trigger.

6 Single Letter Programming Languages You Should Know About


Short Description: C and R are one of the most popular single letter programming languages. There are other lesser-known one-letter programming languages that solve specific problems. While F was developed as modern Fortran, K can be used to write elaborate programs in just a few characters. There exist other one letter programming languages like D, J, and M.
A
part from C, other single letter programming languages are aimed at performing specialized tasks. Many of them have a cult following in the developer community, thanks to their ability to solve tricky problems.

Just like C, another popular single letter programming language is R. It’s used to study numbers and create graphs with intricate data. Earlier, R was called S. In this article, I’ll be telling you about some more single letter programming languages. Let’s take a look:

6 Lesser Known Single Letter Programming Languages

D Programming Language

D is an object-oriented multi-paradigm system programming language with C-like syntax and static typing. It was developed by re-engineering C++ programming language. Apart from inheriting the C++ features, this single letter programming language also has some characteristics of other languages like C#, Java, Ruby, and Python. dlang.org

F Programming language

F was developed as modern Fortran. It’s a minimal subset of the language with about one hundred intrinsic procedures. It’s a compiled, modular, numeric programming language that’s designed to work with legacy Fortran 77 code. F was first included in g95 compiler.Fortran.com/F

J Programming language

J is a single letter programming language with a normal character set that offers the power of APL. It’s a high-level, high-performance, general purpose programming language that runs on 32/64-bit Windows/Linux/Mac, iOS, and Android. Its applications include mathematical, statistical, and logical analysis of data. Since 2011, J is free and open source under GPLv3 license. Jsoftware.com

K Programming Language

K is a proprietary language from array processing. Originally developed in 1993, this single letter language is a variant of APL and infuses the elements of Scheme. After its commercialization by Kx Systems, its open source fork Kona came into the picture. K lets one write detailed algorithms to deal with arrays with the help of just a few keystrokes. Kx.com

M Programming Language

M, or alternatively MUMPS (Massachusetts General Hospital Utility Multi-Programming System), is a general purpose programming language. Its key feature is an inbuilt database that enables high-level access to storage, using simple symbolic program variables and subscripted arrays to access the main memory. M uses the same basic syntax to access volatile memory and non-volatile storage, providing a high-performance data access. Today, it’s used in many large hospitals for data processing. MUMPS

P Programming Language

P is Microsoft’s programming language for asynchronous event-driven programming and Internet of Things applications. It’s a domain specific language that compiles to and interoperates with C. Microsoft has used this single letter programming language to implement and validate the USB device driver stack that comes with Windows Phone and Windows 8. Earlier this year, P was open sourced by Redmond. P on GitHu

Many People Would Be Scared If They Saw In The Mirror Not Their FACES, But Their CHARACTER.